General
-
Target
d6e0d0e29d7bc64a938a5b6a504de9ca_JaffaCakes118
-
Size
47KB
-
Sample
241208-nw9h6axmar
-
MD5
d6e0d0e29d7bc64a938a5b6a504de9ca
-
SHA1
3c7e06e0ac513e6b81f0e0190c24ab87ed38481b
-
SHA256
fba104d3876538a45e0f3ecb3f5b560b8eb06014efb780c15f62a7578466b70f
-
SHA512
85011022b1951a018c406542fb37d29010612374fd53b403e7f86f38b02d0aec443e7e0af4d6d3feae4711cc9cd0fa9efd4275b628bec7ec2d7b78dbe27a4c9f
-
SSDEEP
768:R5scsxI71Hv2mTEb4YXVzancAloPCx+k2uIuHtod6gWtxVjkeaPnAJWAEnRmtln:R5sc375Ab4EBanICQFuIiyd6gWHpkea4
Static task
static1
Behavioral task
behavioral1
Sample
d6e0d0e29d7bc64a938a5b6a504de9ca_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6e0d0e29d7bc64a938a5b6a504de9ca_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
d6e0d0e29d7bc64a938a5b6a504de9ca_JaffaCakes118
-
Size
47KB
-
MD5
d6e0d0e29d7bc64a938a5b6a504de9ca
-
SHA1
3c7e06e0ac513e6b81f0e0190c24ab87ed38481b
-
SHA256
fba104d3876538a45e0f3ecb3f5b560b8eb06014efb780c15f62a7578466b70f
-
SHA512
85011022b1951a018c406542fb37d29010612374fd53b403e7f86f38b02d0aec443e7e0af4d6d3feae4711cc9cd0fa9efd4275b628bec7ec2d7b78dbe27a4c9f
-
SSDEEP
768:R5scsxI71Hv2mTEb4YXVzancAloPCx+k2uIuHtod6gWtxVjkeaPnAJWAEnRmtln:R5sc375Ab4EBanICQFuIiyd6gWHpkea4
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service
-
Modifies security service
-
Drops file in System32 directory
-